Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 658620 - <dev-util/radare2-2.6.0: Multiple vulnerabilities
Summary: <dev-util/radare2-2.6.0: Multiple vulnerabilities
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial
Assignee: Gentoo Security
URL:
Whiteboard: ~3 [noglsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2018-06-20 23:30 UTC by GLSAMaker/CVETool Bot
Modified: 2018-06-23 00:33 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2018-06-20 23:30:03 UTC
CVE-2018-11384 (https://nvd.nist.gov/vuln/detail/CVE-2018-11384):
  The sh_op() function in radare2 2.5.0 allows remote attackers to cause a
  denial of service (heap-based out-of-bounds read and application crash) via
  a crafted ELF file.

CVE-2018-11383 (https://nvd.nist.gov/vuln/detail/CVE-2018-11383):
  The r_strbuf_fini() function in radare2 2.5.0 allows remote attackers to
  cause a denial of service (invalid free and application crash) via a crafted
  ELF file because of an uninitialized variable in the CPSE handler in
  libr/anal/p/anal_avr.c.

CVE-2018-11382 (https://nvd.nist.gov/vuln/detail/CVE-2018-11382):
  The _inst__sts() function in radare2 2.5.0 allows remote attackers to cause
  a denial of service (heap-based out-of-bounds read and application crash)
  via a crafted binary file.

CVE-2018-11381 (https://nvd.nist.gov/vuln/detail/CVE-2018-11381):
  The string_scan_range() function in radare2 2.5.0 allows remote attackers to
  cause a denial of service (heap-based out-of-bounds read and application
  crash) via a crafted binary file.

CVE-2018-11380 (https://nvd.nist.gov/vuln/detail/CVE-2018-11380):
  The parse_import_ptr() function in radare2 2.5.0 allows remote attackers to
  cause a denial of service (heap-based out-of-bounds read and application
  crash) via a crafted Mach-O file.

CVE-2018-11379 (https://nvd.nist.gov/vuln/detail/CVE-2018-11379):
  The get_debug_info() function in radare2 2.5.0 allows remote attackers to
  cause a denial of service (heap-based out-of-bounds read and application
  crash) via a crafted PE file.

CVE-2018-11377 (https://nvd.nist.gov/vuln/detail/CVE-2018-11377):
  The avr_op_analyze() function in radare2 2.5.0 allows remote attackers to
  cause a denial of service (heap-based out-of-bounds read and application
  crash) via a crafted binary file.

CVE-2018-11376 (https://nvd.nist.gov/vuln/detail/CVE-2018-11376):
  The r_read_le32() function in radare2 2.5.0 allows remote attackers to cause
  a denial of service (heap-based out-of-bounds read and application crash)
  via a crafted ELF file.

CVE-2018-11375 (https://nvd.nist.gov/vuln/detail/CVE-2018-11375):
  The _inst__lds() function in radare2 2.5.0 allows remote attackers to cause
  a denial of service (heap-based out-of-bounds read and application crash)
  via a crafted binary file.

CVE-2018-10187 (https://nvd.nist.gov/vuln/detail/CVE-2018-10187):
  In radare2 2.5.0, there is a heap-based buffer over-read in the dalvik_op
  function (libr/anal/p/anal_dalvik.c). Remote attackers could leverage this
  vulnerability to cause a denial of service via a crafted DEX file. Note that
  this issue is different from CVE-2018-8809, which was patched earlier.

CVE-2018-10186 (https://nvd.nist.gov/vuln/detail/CVE-2018-10186):
  In radare2 2.5.0, there is a heap-based buffer over-read in the
  r_hex_bin2str function (libr/util/hex.c). Remote attackers could leverage
  this vulnerability to cause a denial of service via a crafted DEX file. This
  issue is different from CVE-2017-15368.


@Maintainers, please let us know when tree is clean from vulnerable versions.

Thank you
Comment 1 Larry the Git Cow gentoo-dev 2018-06-21 07:01:36 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=ef6cbc703b43f77685f45355ea56a84e6ef08b58

commit ef6cbc703b43f77685f45355ea56a84e6ef08b58
Author:     Sergei Trofimovich <slyfox@gentoo.org>
AuthorDate: 2018-06-21 07:01:25 +0000
Commit:     Sergei Trofimovich <slyfox@gentoo.org>
CommitDate: 2018-06-21 07:01:25 +0000

    dev-util/radare2: drop vulnerable 2.5.0, bug #658620
    
    Bug: https://bugs.gentoo.org/658620
    Package-Manager: Portage-2.3.40, Repoman-2.3.9

 dev-util/radare2/Manifest             |  1 -
 dev-util/radare2/radare2-2.5.0.ebuild | 56 -----------------------------------
 2 files changed, 57 deletions(-)
Comment 2 Sergei Trofimovich (RETIRED) gentoo-dev 2018-06-21 07:03:07 UTC
> @Maintainers, please let us know when tree is clean from vulnerable versions.

Should be clean now.
Comment 3 Michael Boyle 2018-06-22 03:17:27 UTC
no glsa needed. Closing.

Michael Boyle
Security Padawan